Summary for local
-------------
Succeeded: 12 (changed=8)
Failed: 1
-------------
Total states run: 13
Total run time: 71.706 s
DOM0 configuration failed, not continuing
Sorry it happened by mistake… And thank you for your answers
I think my last question wasn’t clear … According to this guide USB qubes | Qubes OS
I read this note Qubes 4.1 only: You should also add the usbcore.authorized_default=0 option, which prevents the initialization of non-input devices. (Qubes ships with a USBGuard configuration that allows only input devices when usbcore.authorized_default=0 is set.)
So I edited this command : sudo nano usbcore.authorized_default=0
If it was for once, but it happened twice and that is why I reacted, because it looks like you are pinging me.
Open the file /etc/default/grub in dom0.
Find the line that begins with GRUB_CMDLINE_LINUX .
Add usbcore.authorized_default=0 to that line, after the word quiet.
Save and close the file.
Run the command grub2-mkconfig -o /boot/grub2/grub.cfg (legacy boot) or grub2-mkconfig -o /boot/efi/EFI/qubes/grub.cfg (EFI) in dom0.
Reboot.
This is how it should go, but I’m not sure as I said. Please create a backup first, and/or provide an alternative to a USB keyboard (PS/2, or if on a laptop be sure it’s keyboard doesn’t use USB interface but PS/2)